xref: /freebsd/sys/compat/linux/linux_signal.c (revision ae41709ab46305df80f7f35bb478a3c8ebf22ebb)
1 /*-
2  * SPDX-License-Identifier: BSD-2-Clause
3  *
4  * Copyright (c) 1994-1995 Søren Schmidt
5  * All rights reserved.
6  *
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted provided that the following conditions
9  * are met:
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  *
16  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
17  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
20  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26  * SUCH DAMAGE.
27  */
28 
29 #include <sys/cdefs.h>
30 __FBSDID("$FreeBSD$");
31 
32 #include <sys/param.h>
33 #include <sys/systm.h>
34 #include <sys/lock.h>
35 #include <sys/mutex.h>
36 #include <sys/sx.h>
37 #include <sys/proc.h>
38 #include <sys/signalvar.h>
39 #include <sys/syscallsubr.h>
40 #include <sys/sysproto.h>
41 
42 #include <security/audit/audit.h>
43 
44 #include "opt_compat.h"
45 
46 #ifdef COMPAT_LINUX32
47 #include <machine/../linux32/linux.h>
48 #include <machine/../linux32/linux32_proto.h>
49 #else
50 #include <machine/../linux/linux.h>
51 #include <machine/../linux/linux_proto.h>
52 #endif
53 #include <compat/linux/linux_signal.h>
54 #include <compat/linux/linux_util.h>
55 #include <compat/linux/linux_emul.h>
56 #include <compat/linux/linux_misc.h>
57 
58 static int	linux_do_tkill(struct thread *td, struct thread *tdt,
59 		    ksiginfo_t *ksi);
60 static void	sicode_to_lsicode(int si_code, int *lsi_code);
61 
62 static void
63 linux_to_bsd_sigaction(l_sigaction_t *lsa, struct sigaction *bsa)
64 {
65 	unsigned long flags;
66 
67 	linux_to_bsd_sigset(&lsa->lsa_mask, &bsa->sa_mask);
68 	bsa->sa_handler = PTRIN(lsa->lsa_handler);
69 	bsa->sa_flags = 0;
70 
71 	flags = lsa->lsa_flags;
72 	if (lsa->lsa_flags & LINUX_SA_NOCLDSTOP) {
73 		flags &= ~LINUX_SA_NOCLDSTOP;
74 		bsa->sa_flags |= SA_NOCLDSTOP;
75 	}
76 	if (lsa->lsa_flags & LINUX_SA_NOCLDWAIT) {
77 		flags &= ~LINUX_SA_NOCLDWAIT;
78 		bsa->sa_flags |= SA_NOCLDWAIT;
79 	}
80 	if (lsa->lsa_flags & LINUX_SA_SIGINFO) {
81 		flags &= ~LINUX_SA_SIGINFO;
82 		bsa->sa_flags |= SA_SIGINFO;
83 #ifdef notyet
84 		/*
85 		 * XXX: We seem to be missing code to convert
86 		 *      some of the fields in ucontext_t.
87 		 */
88 		linux_msg(curthread,
89 		    "partially unsupported sigaction flag SA_SIGINFO");
90 #endif
91 	}
92 	if (lsa->lsa_flags & LINUX_SA_RESTORER) {
93 		flags &= ~LINUX_SA_RESTORER;
94 		/* XXX: We might want to handle it; see Linux sigreturn(2). */
95 	}
96 	if (lsa->lsa_flags & LINUX_SA_ONSTACK) {
97 		flags &= ~LINUX_SA_ONSTACK;
98 		bsa->sa_flags |= SA_ONSTACK;
99 	}
100 	if (lsa->lsa_flags & LINUX_SA_RESTART) {
101 		flags &= ~LINUX_SA_RESTART;
102 		bsa->sa_flags |= SA_RESTART;
103 	}
104 	if (lsa->lsa_flags & LINUX_SA_INTERRUPT) {
105 		flags &= ~LINUX_SA_INTERRUPT;
106 		/* Documented to be a "historical no-op". */
107 	}
108 	if (lsa->lsa_flags & LINUX_SA_ONESHOT) {
109 		flags &= ~LINUX_SA_ONESHOT;
110 		bsa->sa_flags |= SA_RESETHAND;
111 	}
112 	if (lsa->lsa_flags & LINUX_SA_NOMASK) {
113 		flags &= ~LINUX_SA_NOMASK;
114 		bsa->sa_flags |= SA_NODEFER;
115 	}
116 
117 	if (flags != 0)
118 		linux_msg(curthread, "unsupported sigaction flag %#lx", flags);
119 }
120 
121 static void
122 bsd_to_linux_sigaction(struct sigaction *bsa, l_sigaction_t *lsa)
123 {
124 
125 	bsd_to_linux_sigset(&bsa->sa_mask, &lsa->lsa_mask);
126 #ifdef COMPAT_LINUX32
127 	lsa->lsa_handler = (uintptr_t)bsa->sa_handler;
128 #else
129 	lsa->lsa_handler = bsa->sa_handler;
130 #endif
131 	lsa->lsa_restorer = 0;		/* unsupported */
132 	lsa->lsa_flags = 0;
133 	if (bsa->sa_flags & SA_NOCLDSTOP)
134 		lsa->lsa_flags |= LINUX_SA_NOCLDSTOP;
135 	if (bsa->sa_flags & SA_NOCLDWAIT)
136 		lsa->lsa_flags |= LINUX_SA_NOCLDWAIT;
137 	if (bsa->sa_flags & SA_SIGINFO)
138 		lsa->lsa_flags |= LINUX_SA_SIGINFO;
139 	if (bsa->sa_flags & SA_ONSTACK)
140 		lsa->lsa_flags |= LINUX_SA_ONSTACK;
141 	if (bsa->sa_flags & SA_RESTART)
142 		lsa->lsa_flags |= LINUX_SA_RESTART;
143 	if (bsa->sa_flags & SA_RESETHAND)
144 		lsa->lsa_flags |= LINUX_SA_ONESHOT;
145 	if (bsa->sa_flags & SA_NODEFER)
146 		lsa->lsa_flags |= LINUX_SA_NOMASK;
147 }
148 
149 int
150 linux_do_sigaction(struct thread *td, int linux_sig, l_sigaction_t *linux_nsa,
151 		   l_sigaction_t *linux_osa)
152 {
153 	struct sigaction act, oact, *nsa, *osa;
154 	int error, sig;
155 
156 	if (!LINUX_SIG_VALID(linux_sig))
157 		return (EINVAL);
158 
159 	osa = (linux_osa != NULL) ? &oact : NULL;
160 	if (linux_nsa != NULL) {
161 		nsa = &act;
162 		linux_to_bsd_sigaction(linux_nsa, nsa);
163 	} else
164 		nsa = NULL;
165 	sig = linux_to_bsd_signal(linux_sig);
166 
167 	error = kern_sigaction(td, sig, nsa, osa, 0);
168 	if (error)
169 		return (error);
170 
171 	if (linux_osa != NULL)
172 		bsd_to_linux_sigaction(osa, linux_osa);
173 
174 	return (0);
175 }
176 
177 #if defined(__i386__) || (defined(__amd64__) && defined(COMPAT_LINUX32))
178 int
179 linux_signal(struct thread *td, struct linux_signal_args *args)
180 {
181 	l_sigaction_t nsa, osa;
182 	int error;
183 
184 	nsa.lsa_handler = args->handler;
185 	nsa.lsa_flags = LINUX_SA_ONESHOT | LINUX_SA_NOMASK;
186 	LINUX_SIGEMPTYSET(nsa.lsa_mask);
187 
188 	error = linux_do_sigaction(td, args->sig, &nsa, &osa);
189 	td->td_retval[0] = (int)(intptr_t)osa.lsa_handler;
190 
191 	return (error);
192 }
193 #endif /* __i386__ || (__amd64__ && COMPAT_LINUX32) */
194 
195 int
196 linux_rt_sigaction(struct thread *td, struct linux_rt_sigaction_args *args)
197 {
198 	l_sigaction_t nsa, osa;
199 	int error;
200 
201 	if (args->sigsetsize != sizeof(l_sigset_t))
202 		return (EINVAL);
203 
204 	if (args->act != NULL) {
205 		error = copyin(args->act, &nsa, sizeof(l_sigaction_t));
206 		if (error)
207 			return (error);
208 	}
209 
210 	error = linux_do_sigaction(td, args->sig,
211 				   args->act ? &nsa : NULL,
212 				   args->oact ? &osa : NULL);
213 
214 	if (args->oact != NULL && !error) {
215 		error = copyout(&osa, args->oact, sizeof(l_sigaction_t));
216 	}
217 
218 	return (error);
219 }
220 
221 static int
222 linux_do_sigprocmask(struct thread *td, int how, l_sigset_t *new,
223 		     l_sigset_t *old)
224 {
225 	sigset_t omask, nmask;
226 	sigset_t *nmaskp;
227 	int error;
228 
229 	td->td_retval[0] = 0;
230 
231 	switch (how) {
232 	case LINUX_SIG_BLOCK:
233 		how = SIG_BLOCK;
234 		break;
235 	case LINUX_SIG_UNBLOCK:
236 		how = SIG_UNBLOCK;
237 		break;
238 	case LINUX_SIG_SETMASK:
239 		how = SIG_SETMASK;
240 		break;
241 	default:
242 		return (EINVAL);
243 	}
244 	if (new != NULL) {
245 		linux_to_bsd_sigset(new, &nmask);
246 		nmaskp = &nmask;
247 	} else
248 		nmaskp = NULL;
249 	error = kern_sigprocmask(td, how, nmaskp, &omask, 0);
250 	if (error == 0 && old != NULL)
251 		bsd_to_linux_sigset(&omask, old);
252 
253 	return (error);
254 }
255 
256 #if defined(__i386__) || (defined(__amd64__) && defined(COMPAT_LINUX32))
257 int
258 linux_sigprocmask(struct thread *td, struct linux_sigprocmask_args *args)
259 {
260 	l_osigset_t mask;
261 	l_sigset_t set, oset;
262 	int error;
263 
264 	if (args->mask != NULL) {
265 		error = copyin(args->mask, &mask, sizeof(l_osigset_t));
266 		if (error)
267 			return (error);
268 		LINUX_SIGEMPTYSET(set);
269 		set.__mask = mask;
270 	}
271 
272 	error = linux_do_sigprocmask(td, args->how,
273 				     args->mask ? &set : NULL,
274 				     args->omask ? &oset : NULL);
275 
276 	if (args->omask != NULL && !error) {
277 		mask = oset.__mask;
278 		error = copyout(&mask, args->omask, sizeof(l_osigset_t));
279 	}
280 
281 	return (error);
282 }
283 #endif /* __i386__ || (__amd64__ && COMPAT_LINUX32) */
284 
285 int
286 linux_rt_sigprocmask(struct thread *td, struct linux_rt_sigprocmask_args *args)
287 {
288 	l_sigset_t set, oset;
289 	int error;
290 
291 	if (args->sigsetsize != sizeof(l_sigset_t))
292 		return (EINVAL);
293 
294 	if (args->mask != NULL) {
295 		error = copyin(args->mask, &set, sizeof(l_sigset_t));
296 		if (error)
297 			return (error);
298 	}
299 
300 	error = linux_do_sigprocmask(td, args->how,
301 				     args->mask ? &set : NULL,
302 				     args->omask ? &oset : NULL);
303 
304 	if (args->omask != NULL && !error) {
305 		error = copyout(&oset, args->omask, sizeof(l_sigset_t));
306 	}
307 
308 	return (error);
309 }
310 
311 #if defined(__i386__) || (defined(__amd64__) && defined(COMPAT_LINUX32))
312 int
313 linux_sgetmask(struct thread *td, struct linux_sgetmask_args *args)
314 {
315 	struct proc *p = td->td_proc;
316 	l_sigset_t mask;
317 
318 	PROC_LOCK(p);
319 	bsd_to_linux_sigset(&td->td_sigmask, &mask);
320 	PROC_UNLOCK(p);
321 	td->td_retval[0] = mask.__mask;
322 	return (0);
323 }
324 
325 int
326 linux_ssetmask(struct thread *td, struct linux_ssetmask_args *args)
327 {
328 	struct proc *p = td->td_proc;
329 	l_sigset_t lset;
330 	sigset_t bset;
331 
332 	PROC_LOCK(p);
333 	bsd_to_linux_sigset(&td->td_sigmask, &lset);
334 	td->td_retval[0] = lset.__mask;
335 	LINUX_SIGEMPTYSET(lset);
336 	lset.__mask = args->mask;
337 	linux_to_bsd_sigset(&lset, &bset);
338 	td->td_sigmask = bset;
339 	SIG_CANTMASK(td->td_sigmask);
340 	signotify(td);
341 	PROC_UNLOCK(p);
342 	return (0);
343 }
344 
345 int
346 linux_sigpending(struct thread *td, struct linux_sigpending_args *args)
347 {
348 	struct proc *p = td->td_proc;
349 	sigset_t bset;
350 	l_sigset_t lset;
351 	l_osigset_t mask;
352 
353 	PROC_LOCK(p);
354 	bset = p->p_siglist;
355 	SIGSETOR(bset, td->td_siglist);
356 	SIGSETAND(bset, td->td_sigmask);
357 	PROC_UNLOCK(p);
358 	bsd_to_linux_sigset(&bset, &lset);
359 	mask = lset.__mask;
360 	return (copyout(&mask, args->mask, sizeof(mask)));
361 }
362 #endif /* __i386__ || (__amd64__ && COMPAT_LINUX32) */
363 
364 /*
365  * MPSAFE
366  */
367 int
368 linux_rt_sigpending(struct thread *td, struct linux_rt_sigpending_args *args)
369 {
370 	struct proc *p = td->td_proc;
371 	sigset_t bset;
372 	l_sigset_t lset;
373 
374 	if (args->sigsetsize > sizeof(lset))
375 		return (EINVAL);
376 		/* NOT REACHED */
377 
378 	PROC_LOCK(p);
379 	bset = p->p_siglist;
380 	SIGSETOR(bset, td->td_siglist);
381 	SIGSETAND(bset, td->td_sigmask);
382 	PROC_UNLOCK(p);
383 	bsd_to_linux_sigset(&bset, &lset);
384 	return (copyout(&lset, args->set, args->sigsetsize));
385 }
386 
387 /*
388  * MPSAFE
389  */
390 int
391 linux_rt_sigtimedwait(struct thread *td,
392 	struct linux_rt_sigtimedwait_args *args)
393 {
394 	int error, sig;
395 	l_timeval ltv;
396 	struct timeval tv;
397 	struct timespec ts, *tsa;
398 	l_sigset_t lset;
399 	sigset_t bset;
400 	l_siginfo_t linfo;
401 	ksiginfo_t info;
402 
403 	if (args->sigsetsize != sizeof(l_sigset_t))
404 		return (EINVAL);
405 
406 	if ((error = copyin(args->mask, &lset, sizeof(lset))))
407 		return (error);
408 	linux_to_bsd_sigset(&lset, &bset);
409 
410 	tsa = NULL;
411 	if (args->timeout) {
412 		if ((error = copyin(args->timeout, &ltv, sizeof(ltv))))
413 			return (error);
414 		tv.tv_sec = (long)ltv.tv_sec;
415 		tv.tv_usec = (suseconds_t)ltv.tv_usec;
416 		if (itimerfix(&tv)) {
417 			/*
418 			 * The timeout was invalid. Convert it to something
419 			 * valid that will act as it does under Linux.
420 			 */
421 			tv.tv_sec += tv.tv_usec / 1000000;
422 			tv.tv_usec %= 1000000;
423 			if (tv.tv_usec < 0) {
424 				tv.tv_sec -= 1;
425 				tv.tv_usec += 1000000;
426 			}
427 			if (tv.tv_sec < 0)
428 				timevalclear(&tv);
429 		}
430 		TIMEVAL_TO_TIMESPEC(&tv, &ts);
431 		tsa = &ts;
432 	}
433 	error = kern_sigtimedwait(td, bset, &info, tsa);
434 	if (error)
435 		return (error);
436 
437 	sig = bsd_to_linux_signal(info.ksi_signo);
438 
439 	if (args->ptr) {
440 		memset(&linfo, 0, sizeof(linfo));
441 		ksiginfo_to_lsiginfo(&info, &linfo, sig);
442 		error = copyout(&linfo, args->ptr, sizeof(linfo));
443 	}
444 	if (error == 0)
445 		td->td_retval[0] = sig;
446 
447 	return (error);
448 }
449 
450 int
451 linux_kill(struct thread *td, struct linux_kill_args *args)
452 {
453 	int l_signum;
454 
455 	/*
456 	 * Allow signal 0 as a means to check for privileges
457 	 */
458 	if (!LINUX_SIG_VALID(args->signum) && args->signum != 0)
459 		return (EINVAL);
460 
461 	if (args->signum > 0)
462 		l_signum = linux_to_bsd_signal(args->signum);
463 	else
464 		l_signum = 0;
465 
466 	return (kern_kill(td, args->pid, l_signum));
467 }
468 
469 static int
470 linux_do_tkill(struct thread *td, struct thread *tdt, ksiginfo_t *ksi)
471 {
472 	struct proc *p;
473 	int error;
474 
475 	p = tdt->td_proc;
476 	AUDIT_ARG_SIGNUM(ksi->ksi_signo);
477 	AUDIT_ARG_PID(p->p_pid);
478 	AUDIT_ARG_PROCESS(p);
479 
480 	error = p_cansignal(td, p, ksi->ksi_signo);
481 	if (error != 0 || ksi->ksi_signo == 0)
482 		goto out;
483 
484 	tdksignal(tdt, ksi->ksi_signo, ksi);
485 
486 out:
487 	PROC_UNLOCK(p);
488 	return (error);
489 }
490 
491 int
492 linux_tgkill(struct thread *td, struct linux_tgkill_args *args)
493 {
494 	struct thread *tdt;
495 	ksiginfo_t ksi;
496 	int sig;
497 
498 	if (args->pid <= 0 || args->tgid <=0)
499 		return (EINVAL);
500 
501 	/*
502 	 * Allow signal 0 as a means to check for privileges
503 	 */
504 	if (!LINUX_SIG_VALID(args->sig) && args->sig != 0)
505 		return (EINVAL);
506 
507 	if (args->sig > 0)
508 		sig = linux_to_bsd_signal(args->sig);
509 	else
510 		sig = 0;
511 
512 	tdt = linux_tdfind(td, args->pid, args->tgid);
513 	if (tdt == NULL)
514 		return (ESRCH);
515 
516 	ksiginfo_init(&ksi);
517 	ksi.ksi_signo = sig;
518 	ksi.ksi_code = SI_LWP;
519 	ksi.ksi_errno = 0;
520 	ksi.ksi_pid = td->td_proc->p_pid;
521 	ksi.ksi_uid = td->td_proc->p_ucred->cr_ruid;
522 	return (linux_do_tkill(td, tdt, &ksi));
523 }
524 
525 /*
526  * Deprecated since 2.5.75. Replaced by tgkill().
527  */
528 int
529 linux_tkill(struct thread *td, struct linux_tkill_args *args)
530 {
531 	struct thread *tdt;
532 	ksiginfo_t ksi;
533 	int sig;
534 
535 	if (args->tid <= 0)
536 		return (EINVAL);
537 
538 	if (!LINUX_SIG_VALID(args->sig))
539 		return (EINVAL);
540 
541 	sig = linux_to_bsd_signal(args->sig);
542 
543 	tdt = linux_tdfind(td, args->tid, -1);
544 	if (tdt == NULL)
545 		return (ESRCH);
546 
547 	ksiginfo_init(&ksi);
548 	ksi.ksi_signo = sig;
549 	ksi.ksi_code = SI_LWP;
550 	ksi.ksi_errno = 0;
551 	ksi.ksi_pid = td->td_proc->p_pid;
552 	ksi.ksi_uid = td->td_proc->p_ucred->cr_ruid;
553 	return (linux_do_tkill(td, tdt, &ksi));
554 }
555 
556 void
557 ksiginfo_to_lsiginfo(const ksiginfo_t *ksi, l_siginfo_t *lsi, l_int sig)
558 {
559 
560 	siginfo_to_lsiginfo(&ksi->ksi_info, lsi, sig);
561 }
562 
563 static void
564 sicode_to_lsicode(int si_code, int *lsi_code)
565 {
566 
567 	switch (si_code) {
568 	case SI_USER:
569 		*lsi_code = LINUX_SI_USER;
570 		break;
571 	case SI_KERNEL:
572 		*lsi_code = LINUX_SI_KERNEL;
573 		break;
574 	case SI_QUEUE:
575 		*lsi_code = LINUX_SI_QUEUE;
576 		break;
577 	case SI_TIMER:
578 		*lsi_code = LINUX_SI_TIMER;
579 		break;
580 	case SI_MESGQ:
581 		*lsi_code = LINUX_SI_MESGQ;
582 		break;
583 	case SI_ASYNCIO:
584 		*lsi_code = LINUX_SI_ASYNCIO;
585 		break;
586 	case SI_LWP:
587 		*lsi_code = LINUX_SI_TKILL;
588 		break;
589 	default:
590 		*lsi_code = si_code;
591 		break;
592 	}
593 }
594 
595 void
596 siginfo_to_lsiginfo(const siginfo_t *si, l_siginfo_t *lsi, l_int sig)
597 {
598 
599 	/* sig alredy converted */
600 	lsi->lsi_signo = sig;
601 	sicode_to_lsicode(si->si_code, &lsi->lsi_code);
602 
603 	switch (si->si_code) {
604 	case SI_LWP:
605 		lsi->lsi_pid = si->si_pid;
606 		lsi->lsi_uid = si->si_uid;
607 		break;
608 
609 	case SI_TIMER:
610 		lsi->lsi_int = si->si_value.sival_int;
611 		lsi->lsi_ptr = PTROUT(si->si_value.sival_ptr);
612 		lsi->lsi_tid = si->si_timerid;
613 		break;
614 
615 	case SI_QUEUE:
616 		lsi->lsi_pid = si->si_pid;
617 		lsi->lsi_uid = si->si_uid;
618 		lsi->lsi_ptr = PTROUT(si->si_value.sival_ptr);
619 		break;
620 
621 	case SI_ASYNCIO:
622 		lsi->lsi_int = si->si_value.sival_int;
623 		lsi->lsi_ptr = PTROUT(si->si_value.sival_ptr);
624 		break;
625 
626 	default:
627 		switch (sig) {
628 		case LINUX_SIGPOLL:
629 			/* XXX si_fd? */
630 			lsi->lsi_band = si->si_band;
631 			break;
632 
633 		case LINUX_SIGCHLD:
634 			lsi->lsi_errno = 0;
635 			lsi->lsi_pid = si->si_pid;
636 			lsi->lsi_uid = si->si_uid;
637 
638 			if (si->si_code == CLD_STOPPED)
639 				lsi->lsi_status = bsd_to_linux_signal(si->si_status);
640 			else if (si->si_code == CLD_CONTINUED)
641 				lsi->lsi_status = bsd_to_linux_signal(SIGCONT);
642 			else
643 				lsi->lsi_status = si->si_status;
644 			break;
645 
646 		case LINUX_SIGBUS:
647 		case LINUX_SIGILL:
648 		case LINUX_SIGFPE:
649 		case LINUX_SIGSEGV:
650 			lsi->lsi_addr = PTROUT(si->si_addr);
651 			break;
652 
653 		default:
654 			lsi->lsi_pid = si->si_pid;
655 			lsi->lsi_uid = si->si_uid;
656 			if (sig >= LINUX_SIGRTMIN) {
657 				lsi->lsi_int = si->si_value.sival_int;
658 				lsi->lsi_ptr = PTROUT(si->si_value.sival_ptr);
659 			}
660 			break;
661 		}
662 		break;
663 	}
664 }
665 
666 void
667 lsiginfo_to_ksiginfo(const l_siginfo_t *lsi, ksiginfo_t *ksi, int sig)
668 {
669 
670 	ksi->ksi_signo = sig;
671 	ksi->ksi_code = lsi->lsi_code;	/* XXX. Convert. */
672 	ksi->ksi_pid = lsi->lsi_pid;
673 	ksi->ksi_uid = lsi->lsi_uid;
674 	ksi->ksi_status = lsi->lsi_status;
675 	ksi->ksi_addr = PTRIN(lsi->lsi_addr);
676 	ksi->ksi_info.si_value.sival_int = lsi->lsi_int;
677 }
678 
679 int
680 linux_rt_sigqueueinfo(struct thread *td, struct linux_rt_sigqueueinfo_args *args)
681 {
682 	l_siginfo_t linfo;
683 	struct proc *p;
684 	ksiginfo_t ksi;
685 	int error;
686 	int sig;
687 
688 	if (!LINUX_SIG_VALID(args->sig))
689 		return (EINVAL);
690 
691 	error = copyin(args->info, &linfo, sizeof(linfo));
692 	if (error != 0)
693 		return (error);
694 
695 	if (linfo.lsi_code >= 0)
696 		return (EPERM);
697 
698 	sig = linux_to_bsd_signal(args->sig);
699 
700 	error = ESRCH;
701 	if ((p = pfind_any(args->pid)) != NULL) {
702 		error = p_cansignal(td, p, sig);
703 		if (error != 0) {
704 			PROC_UNLOCK(p);
705 			return (error);
706 		}
707 
708 		ksiginfo_init(&ksi);
709 		lsiginfo_to_ksiginfo(&linfo, &ksi, sig);
710 		error = tdsendsignal(p, NULL, sig, &ksi);
711 		PROC_UNLOCK(p);
712 	}
713 
714 	return (error);
715 }
716 
717 int
718 linux_rt_tgsigqueueinfo(struct thread *td, struct linux_rt_tgsigqueueinfo_args *args)
719 {
720 	l_siginfo_t linfo;
721 	struct thread *tds;
722 	ksiginfo_t ksi;
723 	int error;
724 	int sig;
725 
726 	if (!LINUX_SIG_VALID(args->sig))
727 		return (EINVAL);
728 
729 	error = copyin(args->uinfo, &linfo, sizeof(linfo));
730 	if (error != 0)
731 		return (error);
732 
733 	if (linfo.lsi_code >= 0)
734 		return (EPERM);
735 
736 	tds = linux_tdfind(td, args->tid, args->tgid);
737 	if (tds == NULL)
738 		return (ESRCH);
739 
740 	sig = linux_to_bsd_signal(args->sig);
741 	ksiginfo_init(&ksi);
742 	lsiginfo_to_ksiginfo(&linfo, &ksi, sig);
743 	return (linux_do_tkill(td, tds, &ksi));
744 }
745